CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
95.5%
Stack-based buffer overflow in the str_read_packet function in libavformat/psxstr.c in FFmpeg before r13993 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted STR file that interleaves audio and video sectors.
Vendor | Product | Version | CPE |
---|---|---|---|
ffmpeg | ffmpeg | 0.3 | cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:* |
ffmpeg | ffmpeg | 0.3.1 | cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:* |
ffmpeg | ffmpeg | 0.3.2 | cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:* |
ffmpeg | ffmpeg | 0.3.3 | cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:* |
ffmpeg | ffmpeg | 0.3.4 | cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:* |
ffmpeg | ffmpeg | 0.4.0 | cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:* |
ffmpeg | ffmpeg | 0.4.2 | cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:* |
ffmpeg | ffmpeg | 0.4.3 | cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:* |
ffmpeg | ffmpeg | 0.4.4 | cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:* |
ffmpeg | ffmpeg | 0.4.5 | cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:* |
bugs.debian.org/cgi-bin/bugreport.cgi?bug=489965
secunia.com/advisories/30994
secunia.com/advisories/31268
secunia.com/advisories/34385
secunia.com/advisories/34905
security.gentoo.org/glsa/glsa-200903-33.xml
svn.mplayerhq.hu/ffmpeg?view=rev&revision=13993
www.debian.org/security/2009/dsa-1781
www.mandriva.com/security/advisories?name=MDVSA-2008:157
www.openwall.com/lists/oss-security/2008/07/09/9
www.openwall.com/lists/oss-security/2008/07/16/4
www.securityfocus.com/bid/30154
www.ubuntu.com/usn/usn-630-1
www.vupen.com/english/advisories/2008/2031/references
roundup.mplayerhq.hu/roundup/ffmpeg/issue311